anonymous communication.docx
TRANSCRIPT
Anonymous communication
API security
Application analysis
Banking security Chip and PIN (EMV) security, ATM phantom withdrawals
Biometric identification iris recognition, biometric cryptography
Compromising emanations eavesdropping risks of video displays, soft tempest, compromising video emanations signal processor
Deterrence of deception
Economics of information security
Hardware security microcontroller security, FPGAs, semi-invasive attacks on depackaged semiconductor circuits, PIN mailer security
Medical information security
Location and positioning systems Navigation signal security, RFID, relay attacks, distance bounding protocols
OTPW – one-time password authentication system
Privacy and freedom issues
Security protocols
SOAAP software analysis LLVM-based compartmentalisation analysis
Social networking and privacy
Cryptology (publications) block ciphers (Serpent, BEAR, LION, TEA, XTEA), stream ciphers (Chameleon), hash functions (Tiger)
Steganography, information hiding, digital watermarks
Electronic commerce